Skip to main content

Wordpress 2.3 Cross Domain Content Insertion

Source:
http://xssworm.blogvis.com/13/xssworm/
0day-inject-exploit-for-wordpress-23-xsswormcom-all
-version-vulnerable-with-no-patch/


There is a serious holes in wordpress 2.3 that can be used with XSS by a blackhat hacker to attack the wordpress administrator and steal cookies from blogmins. This attack is known as 0day because it has just been reported to public and this is first day of public vulnerability, and *0day means 'published.*'

Proof of concept:
http://wordpress-web-blog.com/wp-admin/
index.php?page=wp-slimstat/wp-slimstat.php?panel=1
&fi=/feed/&ff=1&ft=

This attack to be used against wordpress web blog blogmin to steal blogosphere token to hack blogs. Of course we have included exploit code for this bug at the below.

We have looked at coding for wp-slimstat but we cannot see any problem with input validating. Maybe some of the xssworm.com readers can show us where problem is in the php code because we cannot see any porblem here:

�snips:

C:\temp>findstr GET wp-slimstat.php
$myFilterField = intval( $_GET['ff'] );
$myFilterType = intval( $_GET['ft'] );
$myFilterString = $_GET['fi'];
$myFilterInterval = $_GET['fd'];
$myFilterField = intval( $_GET['ff'] );
$myFilterType = intval( $_GET['ft'] );
$myFilterString = $_GET['fi'];
$myFilterInterval = $_GET['fd'];
'.(!empty($myFilterString)?'� '
.__('Reset filters', 'wp-slimstat').'
':").'


value="'.$_GET["panel"].'" />

';

�snips

With programmor using $_GET variable from user into echo into html output maybe php automatic GET validation filtering is not working for security? We are not programmers of php so we cannot see any porblems here as bug are too complex to understand.

Exploit code for perl whitehats included here:

# Wordpress 2.3 0day exploit � http://xssworm.com
#
# A bug exist in wordpress 2.3 that allow hacker to
# steal blog cookie from wordpress blogmin.
#
# To exploit scripting bug the attacker make link
# to URL of slimstat with XSS shellcode and force
# blog admin to hit link by embedding into fish
# email or making blogmin follow interesting links.
# Also hacker can embed into refer or trackback
# to inject scripting into wordpress dashboard or
# make blogmin visit malicious resource when viewing
# he's blog.
#
#
# Status: not patched published 0day vulnerability
Vendor: wordpress.org
# Credit: http://xssworm.com
# Discovery: 1st November 2007
# Exploit developer: Fracesco Vaj (vaj_at_xssworm.com)
#
# Instruction:
# To execute exploit for wordpress you will need perl or linux
#
# Usage:
#
# Execute with perl or linux as:
# perl wordpress-2.3-0day-xss-injection-bug.pl
#
# Hacker will get prompts for target information.
# Please do not use for irresponsible hacking or to make money.
# Disclaimer: XSSWORM.COM is not responsible.
#
#

#use Net::DNS:Simple;
#use Math;
use Socket;

print "Welcome. What is target email address of wordpress blog admin : \n";
my $target = ;
print "ok target is $target\n";
sleep(3);
print "ok What is address of wordpress blog : \n";
sleep(5); my $address = ;
print "ok target is $target\n";
sleep(6);
# print "testing"
print "ok using /wp-admin/?page=wp-slimstat/wp-slimstat.php
?panel=1&ft=SHELLCODE\n";
print "\n\n � CUT OUTPUT HERE � \n\n";
print "HELO xssworm.com\n";
print "RSET\n";
PRINT "MAIL FROM: \n";
print "RCPT TO: <$target>\n";
print "DATA\n"; print "Free x pciture and movies at $address\n";
print "\r\n.\r\nquit\r\n";
print "\n\n � END OF OUTPUT CUT HERE �\n";
print "";
print "Ok now you neeed to cut the exploit above and paste it to:\n";
print "$address : 25 \n";
print "Shellcode by vaj_at_xssworm.com c. 2007\n";
print "End of attack.\n";
print "";
#print "Debug mode on"
#print "XSS initialized"
#payload
sleep(1); return(0);
# snips
#

Please note that this wp-slimstat does not contain any code injection or mysql injection bug vector that is opened to blackkhat attack via transport of xss.

Many thanks for your comments on this vulnerability in wordpress 2.4

Thanks vaj

--
Francesco Vaj [CISSP - GIAC]
CSS Security Researcher
mailto:vaj_at_nospam.xssworm.com
aim: XSS Cross Site
------
XSS Cross Site Scripting Attacks
Web 2.0 Application Security Information Blog (tm) 2007
http://www.XSSworm.com/
------
"Vaj, bella vaj."

Comments

Popular posts from this blog

Hack Sify,Reliance,Beam Cable - Speed Upto 10 MBPS

I got many requests on how to speed up the internet speed, although some buddy's are using the broadband connection, they wont get the maximum internet speed to browse or to view the online videos... so iam posting this article article specially for them. First Download this ETHERNET Ip Sniffer called   ETHERDETECT Connection-Oriented Packet Sniffer And Protocol Analyzer.by using this tool you can easily speed up net speed. Use the tool to Scan Ip's in your network,Keep Scanning till you get some 200 Ip's .. Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !! NOTE:Please save your Ip address somewhere so as to get back to your original ip ! It will say "Ip conflict" error,keep trying with other Ip's untill you succeed. Sometimes when you will change your Ip you will get same speed ...in that case ..try another ip Download Link~:.. CODE http://adf.ly/9L2dK System Requirements: Processor...

Edit tiles in Windows 8

If you’ve recently installed or upgraded to Windows 8 and have started customizing programs onto its new Start Menu UI, you’ll notice that the program icons are the same old icons placed in an oversized box. You’ll see the program name under it and will be in awe at  how out of place the newly added icons are with the rest   of the Windows 8 theme. We’ve found a handy program to spruce things up by  creating awesome-looking tiles that match the look of Windows 8 apps  on the Start Menu, something like what you see below. And you can get that look using   OblyTile . First thing’s first, the icons you see above are works from users of deviantART. OblyTile only sets up your tiles; you have to provide the icons or images for the tile. But not to worry, we’ll provide you with  a few links which we’ve found to recreate the look and feel  of the screenshot you see above. Getting Started With OblyTile Run OblyTile (no insta...

STEALING PASSWORD WITH GOOGLE HACK

Google is a treasure trove full of important information, especially for  the underground  world. This Potential fact can also be utilized in the data for the username and password stored on a server. If the administrator save important data not in the  complete system authentifikasi folder, then most likely be reached by the google search engine. If data is successfully steal in by the unauthorized person, then the will be in misuse. Here, some google search syntax to crawl the password: 1.  "Login: *" "password =*" filetype: xls  (searching data command to the system files that are stored in  Microsoft Excel ) 2.  allinurl: auth_user_file.txt  (to find files auth_user_file.txt containing password on server). 3.  filetype: xls inurl: "password.xls"  (looking for username and password in ms excel format). This command can change with admin.xls) 4.  intitle: login password  (get link to the  login ...